From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On our duties as scientists.. SIGACT News, 40 (3): 53-59 (2009)A taxonomy of proof systems (part 2).. SIGACT News, 25 (1): 22-30 (1994)Towards a Theory of Software Protection and Simulation by Oblivious RAMs. STOC, стр. 182-194. ACM, (1987)Adaptively Secure Multi-Party Computation., , , и . STOC, стр. 639-648. ACM, (1996)On the Limits of Non-Approximability of Lattice Problems., и . STOC, стр. 1-9. ACM, (1998)Property Testing in Bounded Degree Graphs., и . STOC, стр. 406-415. ACM, (1997)On derandomizing algorithms that err extremely rarely., и . STOC, стр. 109-118. ACM, (2014)Pseudorandomness.. ICALP, том 1853 из Lecture Notes in Computer Science, стр. 687-704. Springer, (2000)On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.. TCC, том 4392 из Lecture Notes in Computer Science, стр. 174-193. Springer, (2007)Improved Derandomization of BPP Using a Hitting Set Generator., и . RANDOM-APPROX, том 1671 из Lecture Notes in Computer Science, стр. 131-137. Springer, (1999)